Types Of Attacks
Types of Malware
Kali Cmds
Case Studies/Lesson
En/Decryption
100

The concept of using relationships, persuasion, and body language to steal private information or convince someone to do something

Social engineering

100

What do you call a piece of malware that's part of a larger family that attaches onto code

Virus

100

What command moves folders?

mv

100

Piece of code that destroys data if certain conditions are met

Logic Bomb

100

Which key allows you to decrypt the encrypted data?

Private Key

200

Exploiting real components to compromise a security protocol/measure

Physical Attack

200
Malware that self-replicates

Worm

200

What's this called " - " (commonly used with a capital letter)

flag

200

A worm that broke into an Iranian nuclear centrifuge

Stuxnet

200

Specific data you can find from a file, email, or a photo

Metadata

300

malicious flood of internet traffic towards a specific user

Denial of Service (DOS)

300

type of malware that listens and records the user's keystrokes

Keylogger

300

What command lets you create/merge files

cat

300

What would happen if you set your old iPhone to Jan 1, 1970

overflow of integers would brick the phone

300

Way of encryption by hiding data in pictures

Steganography

400

Attacker owns a malicious version of a commonly-used website, so when the user mistypes and goes to their website instead.

Watering hole/typo-squatting

400

type of malware that utilizes programs and credentials that are authorized to operate with higher perms

Trojan

400

What command allows you to use commands you usually wouldn't without admin powers

sudo
400

The name of an Android trojan that stole credentials and SMS messages from users, bypassing Google Store Play protections by being downloaded externally.

TeaBot

400

making something simple and making it unclear to read

Obfuscation

500
An attack that submits command-line instructions into a search box to obtain information from its database

Command Injection

500

Type of malware that gives administrative access to a computer with a set of tools whilst unknown

Rootkit

500

Which command opens a text file

nano

500

A Russian gang that is notorious for using high-pressure tactics like ransomware to extort victims.

REvil

500

process of removing and destroying data by overwriting data multiple times

Data Sanitization